International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 154

Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018


Image Steganography Based on Discrete Wavelet Transform and Chaotic Map

Iman I. Hamid


Abstract: 'Steganography is the science of hiding information in the cover media', a force in the context of information security. In this work, a gray image was hidden into another gray scale image using an algorithm was proposed. Firstly, the secret image was encrypted using 'logistic chaotic map' to achieve 'high security'. Then the encrypted secret image embedded into the HH sub band of the wavelet transformed cover image. Favorable results obtained using peak signal to noise ratio (PSNR) and correlation criteria. The implementation of our proposed method done using MATLAB version 2010a.


Keywords: Steganography, Discrete wavelet transform DWT, logistic Chaotic map


Edition: Volume 7 Issue 1, January 2018,


Pages: 588 - 591


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Iman I. Hamid, "Image Steganography Based on Discrete Wavelet Transform and Chaotic Map", International Journal of Science and Research (IJSR), Volume 7 Issue 1, January 2018, pp. 588-591, https://www.ijsr.net/get_abstract.php?paper_id=ART20179396

Similar Articles with Keyword 'Steganography'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan [2]

Share this Article
Top